1
0
mirror of https://github.com/samba-team/samba.git synced 2024-12-25 23:21:54 +03:00
samba-mirror/python/samba/gp/gp_drive_maps_ext.py
David Mulder b76e184c07 gpdupate: Implement Drive Maps Client Side Extension
Signed-off-by: David Mulder <dmulder@samba.org>
Reviewed-by: Andrew Bartlett <abartlet@samba.org>
2023-10-16 00:59:32 +00:00

170 lines
7.2 KiB
Python

# gp_drive_maps_user_ext samba gpo policy
# Copyright (C) David Mulder <dmulder@suse.com> 2020
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation; either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
import os
import json
from samba.gp.gpclass import gp_xml_ext, gp_misc_applier, drop_privileges, \
expand_pref_variables
from subprocess import Popen, PIPE
from samba.gp.gp_scripts_ext import fetch_crontab, install_crontab, \
install_user_crontab
from samba.gp.util.logging import log
from samba.gp import gp_scripts_ext
gp_scripts_ext.intro = '''
### autogenerated by samba
#
# This file is generated by the gp_drive_maps_user_ext Group Policy
# Client Side Extension. To modify the contents of this file,
# modify the appropriate Group Policy objects which apply
# to this machine. DO NOT MODIFY THIS FILE DIRECTLY.
#
'''
def mount_drive(uri):
log.debug('Mounting drive', uri)
out, err = Popen(['gio', 'mount', uri],
stdout=PIPE, stderr=PIPE).communicate()
if err:
if b'Location is already mounted' not in err:
raise SystemError(err)
def unmount_drive(uri):
log.debug('Unmounting drive', uri)
return Popen(['gio', 'mount', uri, '--unmount']).wait()
class gp_drive_maps_user_ext(gp_xml_ext, gp_misc_applier):
def parse_value(self, val):
vals = super().parse_value(val)
if 'props' in vals.keys():
vals['props'] = json.loads(vals['props'])
if 'run_once' in vals.keys():
vals['run_once'] = json.loads(vals['run_once'])
return vals
def unapply(self, guid, uri, val):
vals = self.parse_value(val)
if 'props' in vals.keys() and \
vals['props']['action'] in ['C', 'R', 'U']:
unmount_drive(uri)
others, entries = fetch_crontab(self.username)
if 'crontab' in vals.keys() and vals['crontab'] in entries:
entries.remove(vals['crontab'])
install_user_crontab(self.username, others, entries)
self.cache_remove_attribute(guid, uri)
def apply(self, guid, uri, props, run_once, entry):
old_val = self.cache_get_attribute_value(guid, uri)
val = self.generate_value(props=json.dumps(props),
run_once=json.dumps(run_once),
crontab=entry)
# The policy has changed, unapply it first
if old_val:
self.unapply(guid, uri, old_val)
if props['action'] in ['C', 'R', 'U']:
mount_drive(uri)
elif props['action'] == 'D':
unmount_drive(uri)
if not run_once:
others, entries = fetch_crontab(self.username)
if entry not in entries:
entries.append(entry)
install_user_crontab(self.username, others, entries)
self.cache_add_attribute(guid, uri, val)
def __str__(self):
return 'Preferences/Drives'
def process_group_policy(self, deleted_gpo_list, changed_gpo_list):
for guid, settings in deleted_gpo_list:
if str(self) in settings:
for uri, val in settings[str(self)].items():
self.unapply(guid, uri, val)
for gpo in changed_gpo_list:
if gpo.file_sys_path:
xml = 'USER/Preferences/Drives/Drives.xml'
path = os.path.join(gpo.file_sys_path, xml)
xml_conf = drop_privileges('root', self.parse, path)
if not xml_conf:
continue
drives = xml_conf.findall('Drive')
attrs = []
for drive in drives:
prop = drive.find('Properties')
if prop is None:
log.warning('Drive is missing Properties', drive.attrib)
continue
if prop.attrib['thisDrive'] == 'HIDE':
log.warning('Drive is hidden', prop.attrib)
continue # Don't mount a hidden drive
run_once = False
filters = drive.find('Filters')
if filters:
run_once_filter = filters.find('FilterRunOnce')
if run_once_filter is not None:
run_once = True
uri = 'smb:{}'.format(prop.attrib['path'].replace('\\', '/'))
# Ensure we expand the preference variables, or fail if we
# are unable to (the uri is invalid if we fail).
gptpath = os.path.join(gpo.file_sys_path, 'USER')
try:
uri = expand_pref_variables(uri, gptpath, self.lp,
username=self.username)
except NameError as e:
# If we fail expanding variables, then the URI is
# invalid and we can't continue processing this drive
# map. We can continue processing other drives, as they
# may succeed. This is not a critical error, since some
# Windows specific policies won't apply here.
log.warn('Failed to expand drive map variables: %s' % e,
prop.attrib)
continue
attrs.append(uri)
entry = ''
if not run_once:
if prop.attrib['action'] in ['C', 'R', 'U']:
entry = '@hourly gio mount {}'.format(uri)
elif prop.attrib['action'] == 'D':
entry = '@hourly gio mount {} --unmount'.format(uri)
self.apply(gpo.name, uri, prop.attrib, run_once, entry)
self.clean(gpo.name, keep=attrs)
def rsop(self, gpo):
output = {}
if gpo.file_sys_path:
xml = 'USER/Preferences/Drives/Drives.xml'
path = os.path.join(gpo.file_sys_path, xml)
xml_conf = self.parse(path)
if not xml_conf:
return output
drives = xml_conf.findall('Drive')
for drive in drives:
prop = drive.find('Properties')
if prop is None:
continue
if prop.attrib['thisDrive'] == 'HIDE':
continue
uri = 'smb:{}'.format(prop.attrib['path'].replace('\\', '/'))
if prop.attrib['action'] in ['C', 'R', 'U']:
output[prop.attrib['label']] = 'gio mount {}'.format(uri)
elif prop.attrib['action'] == 'D':
output[prop.attrib['label']] = \
'gio mount {} --unmount'.format(uri)
return output